First published: Mon Jul 08 2019(Updated: )
Aleksa Sarai discovered that Docker was vulnerable to a directory traversal attack. An attacker could use this vulnerability to read and write arbitrary files on the host filesystem as root.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/docker.io | <18.09.7-0ubuntu1~19.04.4 | 18.09.7-0ubuntu1~19.04.4 |
=19.04 | ||
All of | ||
ubuntu/docker.io | <18.09.7-0ubuntu1~18.10.3 | 18.09.7-0ubuntu1~18.10.3 |
=18.10 | ||
All of | ||
ubuntu/docker.io | <18.09.7-0ubuntu1~18.04.3 | 18.09.7-0ubuntu1~18.04.3 |
=18.04 | ||
All of | ||
ubuntu/docker.io | <18.09.7-0ubuntu1~16.04.4 | 18.09.7-0ubuntu1~16.04.4 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Docker vulnerability is CVE-2018-15664 and CVE-2019-5736.
The severity of this Docker vulnerability is critical.
This Docker vulnerability allows an attacker to perform directory traversal attacks and read/write arbitrary files on the host filesystem as root.
Docker versions 18.09.7-0ubuntu1~19.04.4, 18.09.7-0ubuntu1~18.10.3, 18.09.7-0ubuntu1~18.04.3, and 18.09.7-0ubuntu1~16.04.4 are affected by this vulnerability.
To fix this Docker vulnerability, update to version 18.09.7-0ubuntu1~19.04.4 for Ubuntu 19.04, version 18.09.7-0ubuntu1~18.10.3 for Ubuntu 18.10, version 18.09.7-0ubuntu1~18.04.3 for Ubuntu 18.04, or version 18.09.7-0ubuntu1~16.04.4 for Ubuntu 16.04.